[go: nahoru, domu]

US9276745B2 - Preserving image privacy when manipulated by cloud services - Google Patents

Preserving image privacy when manipulated by cloud services Download PDF

Info

Publication number
US9276745B2
US9276745B2 US13/976,298 US201113976298A US9276745B2 US 9276745 B2 US9276745 B2 US 9276745B2 US 201113976298 A US201113976298 A US 201113976298A US 9276745 B2 US9276745 B2 US 9276745B2
Authority
US
United States
Prior art keywords
image
sub
keystream
images
values
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US13/976,298
Other versions
US20130279690A1 (en
Inventor
David M. Durham
Men Long
Karanvir S. Grewal
Prashant Dewan
Xiaozhu Kang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Assigned to INTEL CORPORATION reassignment INTEL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DEWAN, PRASHANT, GREWAL, KARANVIR S., KANG, Xiaozhu, DURHAM, DAVID M., LONG, MEN
Publication of US20130279690A1 publication Critical patent/US20130279690A1/en
Application granted granted Critical
Publication of US9276745B2 publication Critical patent/US9276745B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • H04L9/28
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/27Server based end-user applications
    • H04N21/274Storing end-user multimedia data in response to end-user request, e.g. network recorder
    • H04N21/2743Video hosting of uploaded data from client
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application
    • H04N21/4788Supplemental services, e.g. displaying phone caller identification, shopping application communicating with other users, e.g. chatting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/8146Monomedia components thereof involving graphical data, e.g. 3D object, 2D graphics
    • H04N21/8153Monomedia components thereof involving graphical data, e.g. 3D object, 2D graphics comprising still images, e.g. texture, background image
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Definitions

  • Embodiments generally relate to image encryption, and more particularly, to preserving image privacy when the image is hosted or otherwise manipulated by cloud services such as photo-sharing websites.
  • Image processing and storage functions are rapidly being integrated into the cloud.
  • Image uploading or photo-sharing is pervasive today, and ever expanding.
  • Well-known sites such as Facebook®, Twitter®, Google Picasa®, Photobucket®, Flickr®, and the like, store billions of photos.
  • privacy concerns have started to surface, with users concerned about the abuse of their personal data and photos, potentially from the sites themselves or from other unknown users.
  • Publicly available photos on service provider websites can be used to identify strangers in shopping malls, university campuses, or on public streets, for example, simply by performing facial recognition and matching the photos to names or other identifying information available on the websites of the service providers.
  • hackers comprising the databases of photo-sharing websites.
  • the hacker or other bad actor may manipulate the content of the original image for nefarious reasons.
  • Still other users can download or otherwise hack the photos, save them to external media, or upload them to other websites, with the original owner losing any measure of effective access control, thereby allowing anyone who comes into contact with the copies to have access to the original content.
  • FIG. 1 illustrates a conventional system in which hackers or others can gain access to photos.
  • User application 105 which may be operated by a person 110 , and can include a computer 115 , a smart phone 120 , a personal digital assistant (PDA) 125 , or a camera 130 , and so forth, may upload images 135 to cloud service 140 .
  • the user application 105 or other authorized person may later browse for the images at 165 .
  • a hacker 150 which may include a person 155 or a computer 160 , or other unauthorized persons, and so forth, may gain access to the images 135 by accessing the cloud service 140 at 145 .
  • JPEG Joint Photographic Experts Group
  • FIG. 1 illustrates a conventional system in which hackers or others can gain access to photos through a cloud service.
  • FIG. 2 illustrates a system including middleware for preserving the image privacy irrespective of image manipulations by the cloud service, according to an example embodiment of the present invention.
  • FIG. 3 illustrates a flow diagram of aspects associated with the middleware of FIG. 2 .
  • FIG. 4 illustrates a flow diagram of additional aspects associated with the middleware of FIG. 2 .
  • FIGS. 5 and 6 illustrate block diagrams including a database associated with the middleware of FIG. 2 .
  • FIG. 7 illustrates a flow diagram demonstrating a technique for encrypting and uploading images to a cloud service.
  • FIG. 8 illustrates a flow diagram demonstrating a technique for receiving and decrypting images from a cloud service.
  • FIG. 9 illustrates a flow and block diagram related to permutating and encrypting blocks of an image, according to another example embodiment of the present invention.
  • FIG. 10 illustrates a flow and block diagram related to decrypting the images of FIG. 9 .
  • FIG. 11 illustrates a block diagram of a physical object having affixed thereto an encrypted printed image, according to yet another example embodiment of the present invention.
  • Embodiments of an apparatus and method for preserving image privacy when hosted or otherwise manipulated by cloud services, associated processes for using such apparatus, and associated systems with which such apparatus and method can be used, are described.
  • FIG. 2 illustrates a system 200 including middleware 205 for preserving image privacy irrespective of image manipulations by the cloud services 140 , according to an example embodiment of the present invention.
  • the user application 105 may be operated by a person 110 , and can include a computer 115 , a smart phone 120 , a personal digital assistant (PDA) 125 , or a camera 130 , and an forth, which may upload encrypted images 235 to cloud service 140 .
  • the user application 105 can include or otherwise be associated with middleware 205 .
  • the middleware 205 and its components can be implemented in hardware, software, firmware, or any combination thereof.
  • the middleware 205 encrypts images using methods that are resilient to manipulations by the cloud services 140 .
  • the cloud services 140 can include, for example, social networks or photo storage sites, which typically resize, filter, crop, or otherwise reformat images, thereby causing conventional encryption techniques to be rendered inoperable.
  • Embodiments of the present invention allows users to preserve the privacy of selected photos, upload those photos to any photo-sharing websites or other cloud services, and correctly decrypt the photos back to the original images regardless of the typical backend processing by the photo-sharing sites. Thus, there is no need to change the existing websites or cloud computing models.
  • encryption and decryption using embodiments disclosed herein are practical today and can be efficiently accomplished in less than a second for each photo.
  • the middleware 205 transmits encrypted images 235 to the cloud services, so that if a hacker 150 , which may include person 155 or computer 160 , attempts to access the images, all that they would gain access to is the ciphertexts 245 , and therefore would be unable to view the images.
  • Authorized users who have the appropriate middleware 205 and appropriate key, can browse the images at 265 and correctly decrypt the images 240 for later viewing, irrespective of the filtering, resizing, cropping, or other manipulations to the images by the cloud services 140 .
  • the middleware 205 can receive an original image from the user 105 .
  • the middleware 205 includes a splitter 220 , which can split the image into first and second sub-images, as described, in further detail below.
  • the middleware 205 includes an encrypt section 210 , which can encrypt the first and second sub-images, and produce first and second encrypted sub-images as also described in further detail below.
  • a random number generator (RNG) 215 is used to generate certain encryption keys, such as a master key to be stored, in database 225 , and an image key to be stored in meta data of the image.
  • RNG random number generator
  • the images can be received and decrypted by the middleware 205 , which may be associated, with the same user application 105 or another authorized user application.
  • the middleware 205 includes a decrypt section 230 to decrypt the first and second sub-images, and a combiner 222 to combine the first and second sub-images into substantially the original image.
  • FIG. 3 illustrates a flow diagram of aspects associated with the splitter 220 and the encrypt section 210 of FIG. 2 .
  • An original image 305 includes pixels 302 . It will be understood that the image 305 can have any suitable number of pixels, and the enlarged pixels shown in the figures are merely for the purpose of illustration.
  • Each pixel 302 includes an associated Red/Green/Blue (RGB) pixel value such as RGB pixel_value_A(u,v), where u is the row index and v is the column index for each pixel.
  • RGB pixel values are 8 bits, which can represent between 0 and 255 different values or hues. It will be understood that the embodiments and inventive concepts described herein are applicable to 16 bit RGB pixel values, or any other suitable value.
  • the splitter 220 can split the original image 305 into sub-image 310 and sub-image 315 .
  • Each of the RGB pixel values of the sub-image 310 such as RGB pixel_value_B(u,v), will have a range between 0 and 127 different values or hues.
  • each of the RGB pixels values of the sub-image 315 such as RGB pixel_value_C(u,v), will have a range between 0 and 127 different values or hues.
  • the encrypt section 210 adds a corresponding keystream value, such as keystream(u,v), which can be a 7 bit random number 320 generated for each RGB pixel value.
  • keystream(u,v) can be a 7 bit random number 320 generated for each RGB pixel value.
  • the encrypt section 210 adds a corresponding keystream value, such as keystream(u,v), which can be the 7 bit random number 320 generated for each RGB pixel value.
  • keystream(u,v) can be the 7 bit random number 320 generated for each RGB pixel value.
  • the pixel_cipher_B uses a different keystream from the pixel_cipher_C.
  • the splitter 220 can first determine an RGB pixel value for each pixel of the original image, then divide each RGB pixel value of the original image into a first split RGB pixel value (e.g., RGB pixel_value_B(u,v)) and a second split RGB pixel value (e.g., RGB pixel_value_C(u,v)).
  • Each split RGB pixel_value_B(u,v) can be associated with a corresponding RGB pixel value of the sub-image 310 .
  • each split RGB pixel_value_C(u,v) can be associated with a corresponding RGB pixel value of the sub-image 315 .
  • the corresponding keystream(u,v) can then be added.
  • the encrypt section 210 can therefore produce a first encrypted sub-image and a second encrypted sub-image, which together can be represented as G(data+keystream) as shown at 335 .
  • the middleware 205 can transmit the G(data+keystream), including the first and second encrypted sub-images, to cloud services 140 .
  • the cloud services 140 can perform various post-processing functions, represented here as f(.), such as resize, crop, and filter.
  • FIG. 4 illustrates a flow diagram of additional aspects associated with the decrypt section 230 and combiner 222 of FIG. 2 .
  • the decrypt section 230 of the middleware 205 can receive the f(G(data+keystream)) at 405 from the cloud services 140 .
  • the decrypt section 230 can then decrypt the f(G(data+keystream)) to recover the original image.
  • the decrypt section 230 subtracts a corresponding reconstructed keystream value (e.g. f(G(keystream))).
  • the decrypt section 230 subtracts a corresponding reconstructed keystream value (e.g., f(G(keystream))) selected from the plurality of modified keystream values.
  • a corresponding reconstructed keystream value e.g., f(G(keystream))
  • the G(keystream) can be modified by a predefined post-processing function f(.), which can be stored in database 225 and associated with a cloud service identifier (ID) 440 .
  • the database 225 can store multiple different post-processing functions associated with any number of different cloud services, each with its own ID. For example, if a photo-storage site is known to resize an image by a certain proportion, such function is stored in database 225 and identified by the associated site ID.
  • post-processing functions can be determined based on experimental usage and analysis of the post-processing functions performed on images when subjected to the cloud service sites.
  • the ID 440 can also be stored in the meta data of the image, as further described below.
  • the decrypt section 230 uses the master_key stored in the database 225 to generate the proper keystream, which together with the applied post-processing function f(.), results in f(G(keystream)).
  • the f(G(keystream)) is used to decrypt the image data, as further shown at 410 , 415 , and 420 . Further details regarding the master_key are provided below.
  • the recovered image corresponds to decrypted sub-images 310 and 315 .
  • the decrypted sub-images can be combined by the combiner 222 into substantially the original image 305 .
  • FIGS. 5 and 6 illustrate block diagrams including a database 225 associated with the middleware 205 of FIG. 2 .
  • the encrypt section 210 can produce a master_key 505 , which is stored in the database 225 .
  • the RNG 215 can produce the master_key 505 , which is preferably a 256-bit cryptographically strong random number.
  • the RNG 215 can produce a random number (i.e., Rnumber 510 ), which is used to generate an image_key.
  • the Rnumber 510 can be embedded in the metadata 525 of the image 520 , and is preferably a 128-bit random number.
  • the metadata 525 can also store the ID 440 , which is described above.
  • the keystream can be generated, by either or both of the encrypt section 210 and the decrypt section 230 , using at least the master_key 505 , as shown in both FIGS. 5 and 6 .
  • the Encrypt(.) function can be Advanced Encryption Standard (AES) cipher or any other suitable encryption algorithm.
  • AES Advanced Encryption Standard
  • the pixel_index corresponds to the (u,v) pixel index location of the image.
  • the image_key is used to guarantee that each instance of an image will have distinct keystream based upon the image_key that is derived in (7), as further set forth below. In other words, the keystream values discussed above are generated using the image_key and the pixel_index.
  • the kdf(.) function can be a standard key derivation function, either cipher or hash-based.
  • the Aux can correspond to auxiliary data, such as for security purposes.
  • the encrypt section 210 of the middleware 205 can encrypt the image using (6) and/or (7).
  • the decrypt section 230 of the middleware 205 can decrypt the image using (6) and/or (7).
  • the middleware 205 is the only entity capable of producing the keystream, only the middleware 205 having the master_key 505 can decrypt the images.
  • FIG. 7 illustrates a flow diagram 700 of a technique for encrypting and uploading images to a cloud service(s).
  • the technique begins at 705 , where the middleware receives an image from a user or user application.
  • the image is decompressed to recover RGB pixel values.
  • the image is split into two sub-images. The number of bits associated with each RGB pixel value of sub-image 725 and sub-image 720 is less than the number of bits associated with each RGB pixel value of the original image.
  • the middleware generates a keystream, which is added to the sub-images at 740 and 735 , as explained in detail above. Image compression can be performed after or during the adding of the keystream.
  • the encrypted sub-images at 750 and 745 are uploaded by the middleware to the cloud service(s) at 755 .
  • FIG. 8 illustrates a flow diagram 800 of a technique for receiving and decrypting images from a cloud service.
  • the cloud service(s) perform post-processing operations on the encrypted sub-images.
  • the middleware receives the encrypted sub-images from the cloud service(s).
  • the encrypted sub-images are made ready for decryption by the decrypt section of the middleware.
  • the sub-images are decompressed using image decompression algorithms such as JPEG.
  • the middleware generates the modified keystream, as explained in detail above, and the modified keystream is subtracted from the sub-images at 845 and 840 , either during or after the decompression.
  • the flow proceeds to decrypted sub-images at 855 and 850 , which are recombined or otherwise reconstructed into the original image at 860 .
  • FIG. 9 illustrates a flow and block diagram 900 related to permutating and encrypting blocks (e.g., (1), (2), . . . , (16)) of an image 905 , according to another example embodiment of the present invention.
  • FIG. 10 illustrates a flow and block diagram related to decrypting the image 905 of FIG. 9 . Reference is now made to FIGS. 9 and 10 .
  • Blocks of the image 905 can be defined to have a particular size, or otherwise divided into N blocks, each block including some number of pixels. For example, an image with 2048 by 1024 pixels can have the block size defined as 64 by 64 pixels. In such case, the total number of blocks will be 512.
  • the encrypt section 210 can select a permutation from a factorial of N permutations. In other words, the encrypt section 210 can permutate the blocks in 512! (factorial of 512) number of different ways, which is even larger than 2 512 . Put differently, the encrypt section 210 can then permutate the N blocks of the image based on the selected permutation.
  • the middleware 205 can choose only one out of all possible 512! (factorial of 512) possibilities, which is practically infeasible for any third party, without the secret key 925 , to guess correctly. This is quite different from, for example, a jigsaw puzzle where there is only one final pattern and pieces include various shapes to help with the orientation.
  • the permutation causes the file content 910 of image 905 to be scrambled into the file content 920 of the permutated image 930 . There is no clue that is available to human users on how to reconstruct the orientations.
  • the middleware 205 can then upload the permutated image 930 to the cloud service(s) 140 , which can perform post-processing functions (e.g., f(.)) on the permutated image.
  • post-processing functions e.g., f(.)
  • the permutated image is then received, from the cloud service(s) 140 and decrypted using the decrypt section 230 .
  • the decrypt section 230 can use the secret key 925 to decrypt the permutation and return the file contents 920 of the permutated image 930 back to substantially the file contents 910 of the original image 905 .
  • the secure permutation can be performed by generating a keystream and by using the secret key 925 and a stream cipher F(.).
  • the encrypt section 210 can receive an image having a size (e.g., height ⁇ width). A predefined block size M can be used.
  • the encrypt section 210 can also receive and/or generate the secret key 825 , the stream cipher F(.), and a key derivation function (e.g., kdf(.)).
  • the encrypt section 210 can output instance_randomH and a permutated image.
  • instance_randomH For every instantiation of middleware to encrypt a photo by permutation, generate a random number H (e.g., 128-bit), referred to herein as instance_randomH.
  • instance_key Kdf(K, H), where K is the secret key 925 .
  • K is the secret key 925 .
  • Each instance_key can be a distinct key to augment the security.
  • keystream is a bit stream (e.g., 1000111111110).
  • the encrypt section 210 can permute the blocks of the image.
  • the decrypt section 230 can gain access to the secret key K (e.g., 925 ) and the private hint H (i.e., instance_randomH) to generate the permutation sequence.
  • the permutation can then be reversed and the original image reconstructed.
  • the stream cipher F(.) and the derivation function kdf(.) can be public, and H is a random number used as the instance identifier.
  • methods disclosed herein include selecting a permutation from a factorial of N permutations.
  • a keystream can be generated.
  • the N blocks can be permutated based on the keystream and the selected permutation.
  • Each of the N blocks can be swapped with another of the N blocks based on the keystream.
  • N swap positions can be determined. For example, the swap position can be based on keystream[j] modulo N, where j is an index into the keystream. The index j can be decremented from N down to 2.
  • Each of the N blocks can be swapped with another of the N blocks located at the swap position.
  • FIG. 11 illustrates a block diagram 1100 of a physical object 1105 having affixed thereto an encrypted printed image 1110 , according to yet another example embodiment of the present invention.
  • the middleware 205 can encrypt an image using one or more of the techniques described. In detail above.
  • the image can then be physically transformed, as shown at 1120 .
  • the physical transformations can include resizing, scaling, compressing, cropping, and so forth, and can be performed on the encrypted image electronically and/or on physical printed media.
  • the image can be printed on physical media, thereby resulting in a printed image 1110 .
  • the printed image 1110 is scrambled or otherwise undecipherable without the appropriate decryption algorithm and keys.
  • hackers or other adversaries are therefore prevented from interpreting the printed image 1110 .
  • the encrypted image allows information to be securely transmitted in the physical non-electronic world.
  • the printed image can be affixed to a physical object 1105 .
  • the physical object can be, for example, a package, a sign, paper, a display, a magazine, a newspaper, and the like.
  • the physical object can also be a screen or a display, such as a move screen, a TV screen, a computer display, a phone display, or the like.
  • the printed image 1110 can be photographed or scanned using, for example, a camera and/or scanner 1115 .
  • a digital image can be captured of the printed image 1110 .
  • the middleware 205 can decrypt the digital image, using one or more of the techniques described in detail above.
  • the decryption algorithm can reconstruct the original image, or at least an approximate of the original image, because the middleware 205 has access to the master key and the other components and algorithms for decrypting the photographed or scanned image, notwithstanding the physical transformations 1120 of the encrypted image.
  • images can be covertly transmitted, using a form of visual cryptography, which can be used for advertising, subscription services, audience selection, games, secure social networking, among other possibilities.
  • images can be privately or covertly transmitted from middleware, to a physical object, then to an endpoint such as the same or different middleware.
  • the image can remain confidential or private, even when exposed to external physical world scenarios.
  • Embodiments include middleware for uploading encrypted image data to websites (e.g., social media and/or cloud services) using the lossy data formats already accepted by the backend services using a new loss-resilient encryption algorithm.
  • the resilient encrypted image cipher text can be manipulated by the back end cloud services (e.g., compressed, cropped, transformed, filtered, etc.), yet the approximate original image can still be restored given the ciphertext and a secret decryption key used by authorized parties.
  • the encrypted image can be downloaded, copied, moved, manipulated and uploaded to other websites while remaining secure (i.e., encrypted) so only parties with the correct key can decrypt the image and restore the approximate original using one or more of the resilient encryption algorithms disclosed herein.
  • Specialized hardware or hardware accelerators can be used to accelerate the resilient cryptographic algorithms.
  • the middleware can be included within general purpose computers, tablets, smart phones, ultrabooks, servers, or the like. Embodiments disclosed herein enhance image and media privacy, allowing manipulation of ciphertext, while providing the ability to recover the original plaintext content.
  • an article drawn from the set of media including floppy disks, optical disks, fixed disks, volatile memory, non-volatile memory, random access memory, read-only memory, or flash memory, comprising a machine-accessible medium having associated non-transitory instructions that, when executed in a test and measurement device, results in a machine performing the steps of the various embodiments of the invention as disclosed herein.
  • floppy disks, optical disks, fixed disks, volatile memory, non-volatile memory, random access memory, read-only memory, or flash memory comprising a machine-accessible medium having associated non-transitory instructions that, when executed in a test and measurement device, results in a machine performing the steps of the various embodiments of the invention as disclosed herein.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Graphics (AREA)
  • Computing Systems (AREA)
  • Facsimile Transmission Control (AREA)
  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

An apparatus and method for preserving image privacy when manipulated by cloud services includes middleware for receiving an original image, splitting the original image into two sub-images, where the RGB pixel values of the sub-images have a bit value that is less than RGB pixel values of the original image. The sub-images are encrypted by adding a keystream to the RGB pixel values of the sub-images. The sub-image data is transmitted to a cloud service such as a social network or photo-sharing site, which manipulate the images by resizing, cropping, filtering, or the like. The sub-image data is received by the middleware and is successfully decrypted irrespective of the manipulations performed by the cloud services. In an alternative embodiment, the blocks of the original image are permutated when encrypted, and then reverse-permutated when decrypted.

Description

TECHNICAL FIELD
Embodiments generally relate to image encryption, and more particularly, to preserving image privacy when the image is hosted or otherwise manipulated by cloud services such as photo-sharing websites.
BACKGROUND
Image processing and storage functions are rapidly being integrated into the cloud. Image uploading or photo-sharing is pervasive today, and ever expanding. Well-known sites such as Facebook®, Twitter®, Google Picasa®, Photobucket®, Flickr®, and the like, store billions of photos. With the explosive growth in image storage, privacy concerns have started to surface, with users concerned about the abuse of their personal data and photos, potentially from the sites themselves or from other unknown users.
Publicly available photos on service provider websites can be used to identify strangers in shopping malls, university campuses, or on public streets, for example, simply by performing facial recognition and matching the photos to names or other identifying information available on the websites of the service providers. There are increasingly more incidents of hackers comprising the databases of photo-sharing websites. The hacker or other bad actor may manipulate the content of the original image for nefarious reasons. Still other users can download or otherwise hack the photos, save them to external media, or upload them to other websites, with the original owner losing any measure of effective access control, thereby allowing anyone who comes into contact with the copies to have access to the original content.
FIG. 1 illustrates a conventional system in which hackers or others can gain access to photos. User application 105, which may be operated by a person 110, and can include a computer 115, a smart phone 120, a personal digital assistant (PDA) 125, or a camera 130, and so forth, may upload images 135 to cloud service 140. The user application 105 or other authorized person may later browse for the images at 165. However, a hacker 150, which may include a person 155 or a computer 160, or other unauthorized persons, and so forth, may gain access to the images 135 by accessing the cloud service 140 at 145.
Sometimes users scan sensitive documents into photos and stored them in photo-sharing sites, not understanding the ramifications of easy access by others. In other cases, users might want to only share certain photos with close family members or friends, or otherwise do not want the service provider to have access to the photo content. Conventional encryption technologies are ineffective because photo-sharing websites usually perform post-processing on the uploaded images, such as resizing, filtering, cropping, and so forth. Such post-processing operations change the values of the encrypted contents, and the subsequent decrypted contents will be completely garbled rather than revert to the original image content.
Another compounding factor is that the image compression algorithms commonly used today, such as Joint Photographic Experts Group (JPEG) images, have lossy compression algorithms including floating-point arithmetic errors and quantization loss, which are incompatible with standard encryption algorithms. Conventional xor approaches to encryption and keystreams break when the file contents are modified externally. Although full homomorphic encryption is more resilient to such operations, it is impractical today because encrypting just one bit can require megabytes of keys and hours of computation time for encryption and decryption of the photos.
It would be desirable to effectively and correctly decrypt an encrypted image stored and then retrieved from a photo-sharing website or other similar cloud service, particularly after post-processing operations are performed by the cloud service.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments of the present invention are illustrated by way of example, and not by way of limitation, in the drawings and in which like reference numerals refer to similar elements.
FIG. 1 illustrates a conventional system in which hackers or others can gain access to photos through a cloud service.
FIG. 2 illustrates a system including middleware for preserving the image privacy irrespective of image manipulations by the cloud service, according to an example embodiment of the present invention.
FIG. 3 illustrates a flow diagram of aspects associated with the middleware of FIG. 2.
FIG. 4 illustrates a flow diagram of additional aspects associated with the middleware of FIG. 2.
FIGS. 5 and 6 illustrate block diagrams including a database associated with the middleware of FIG. 2.
FIG. 7 illustrates a flow diagram demonstrating a technique for encrypting and uploading images to a cloud service.
FIG. 8 illustrates a flow diagram demonstrating a technique for receiving and decrypting images from a cloud service.
FIG. 9 illustrates a flow and block diagram related to permutating and encrypting blocks of an image, according to another example embodiment of the present invention.
FIG. 10 illustrates a flow and block diagram related to decrypting the images of FIG. 9.
FIG. 11 illustrates a block diagram of a physical object having affixed thereto an encrypted printed image, according to yet another example embodiment of the present invention.
DETAILED DESCRIPTION
Reference will now be made in detail to embodiments of the invention, examples of which are illustrated in the accompanying drawings. In the following detailed description, numerous specific details are set forth to enable a thorough understanding of the present invention. It should be understood, however, that persons having ordinary skill in the art may practice the present invention without these specific details. In other instances, well-known methods, procedures, components, circuits, and networks have not been described in detail so as not to unnecessarily obscure aspects of the embodiments.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first image could be termed a second image, and, similarly, a second image could be termed a first image, without departing from the scope of the present invention.
The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the description of the invention and the appended claims, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term “and/or” as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Embodiments of an apparatus and method for preserving image privacy when hosted or otherwise manipulated by cloud services, associated processes for using such apparatus, and associated systems with which such apparatus and method can be used, are described.
FIG. 2 illustrates a system 200 including middleware 205 for preserving image privacy irrespective of image manipulations by the cloud services 140, according to an example embodiment of the present invention. The user application 105 may be operated by a person 110, and can include a computer 115, a smart phone 120, a personal digital assistant (PDA) 125, or a camera 130, and an forth, which may upload encrypted images 235 to cloud service 140. The user application 105 can include or otherwise be associated with middleware 205. The middleware 205 and its components can be implemented in hardware, software, firmware, or any combination thereof.
The middleware 205 encrypts images using methods that are resilient to manipulations by the cloud services 140. The cloud services 140 can include, for example, social networks or photo storage sites, which typically resize, filter, crop, or otherwise reformat images, thereby causing conventional encryption techniques to be rendered inoperable. Embodiments of the present invention allows users to preserve the privacy of selected photos, upload those photos to any photo-sharing websites or other cloud services, and correctly decrypt the photos back to the original images regardless of the typical backend processing by the photo-sharing sites. Thus, there is no need to change the existing websites or cloud computing models. Moreover, encryption and decryption using embodiments disclosed herein are practical today and can be efficiently accomplished in less than a second for each photo.
As shown in FIG. 2, the middleware 205 transmits encrypted images 235 to the cloud services, so that if a hacker 150, which may include person 155 or computer 160, attempts to access the images, all that they would gain access to is the ciphertexts 245, and therefore would be unable to view the images. Authorized users, on the other hand, who have the appropriate middleware 205 and appropriate key, can browse the images at 265 and correctly decrypt the images 240 for later viewing, irrespective of the filtering, resizing, cropping, or other manipulations to the images by the cloud services 140.
The middleware 205 can receive an original image from the user 105. The middleware 205 includes a splitter 220, which can split the image into first and second sub-images, as described, in further detail below. The middleware 205 includes an encrypt section 210, which can encrypt the first and second sub-images, and produce first and second encrypted sub-images as also described in further detail below.
A random number generator (RNG) 215 is used to generate certain encryption keys, such as a master key to be stored, in database 225, and an image key to be stored in meta data of the image. After transmission of the first and second encrypted sub-images to the cloud services 140, and manipulation by the cloud services 140, the images can be received and decrypted by the middleware 205, which may be associated, with the same user application 105 or another authorized user application. The middleware 205 includes a decrypt section 230 to decrypt the first and second sub-images, and a combiner 222 to combine the first and second sub-images into substantially the original image.
FIG. 3 illustrates a flow diagram of aspects associated with the splitter 220 and the encrypt section 210 of FIG. 2. An original image 305 includes pixels 302. It will be understood that the image 305 can have any suitable number of pixels, and the enlarged pixels shown in the figures are merely for the purpose of illustration. Each pixel 302 includes an associated Red/Green/Blue (RGB) pixel value such as RGB pixel_value_A(u,v), where u is the row index and v is the column index for each pixel. Generally, RGB pixel values are 8 bits, which can represent between 0 and 255 different values or hues. It will be understood that the embodiments and inventive concepts described herein are applicable to 16 bit RGB pixel values, or any other suitable value. The splitter 220 can split the original image 305 into sub-image 310 and sub-image 315.
Each of the RGB pixel values of the sub-image 310, such as RGB pixel_value_B(u,v), will have a range between 0 and 127 different values or hues. Similarly, each of the RGB pixels values of the sub-image 315, such as RGB pixel_value_C(u,v), will have a range between 0 and 127 different values or hues. Such characteristics allow for a keystream to be added to the RGB pixel values of the sub-images without causing a mathematical carry, which would otherwise lead to negative or invalid results.
For each of the RGB pixel values of the sub-image 310, the encrypt section 210 adds a corresponding keystream value, such as keystream(u,v), which can be a 7 bit random number 320 generated for each RGB pixel value. For example, the following equation (1) as shown at 325 can be used:
pixel_cipher B(u,v)=pixel_value B(u,v)+keystream(u,v,“0”)  (1)
Similarly, for each of the RGB pixel values of the sub-image 315, the encrypt section 210 adds a corresponding keystream value, such as keystream(u,v), which can be the 7 bit random number 320 generated for each RGB pixel value. For example, the following equation (2) as shown at 330 can be used:
pixel_cipher C(u,v)=pixel_value C(u,v)+keystream(u,v,“1”)  (2)
The distinguishers “0” and “1” in the keystream( ) of equations (1) and (2), respectively, denote that the crypto keys are not repeated for different sub images, which increases the security guarantee. In other words, the pixel_cipher_B uses a different keystream from the pixel_cipher_C. The splitter 220 can first determine an RGB pixel value for each pixel of the original image, then divide each RGB pixel value of the original image into a first split RGB pixel value (e.g., RGB pixel_value_B(u,v)) and a second split RGB pixel value (e.g., RGB pixel_value_C(u,v)). Each split RGB pixel_value_B(u,v) can be associated with a corresponding RGB pixel value of the sub-image 310. Similarly, each split RGB pixel_value_C(u,v) can be associated with a corresponding RGB pixel value of the sub-image 315. The corresponding keystream(u,v) can then be added.
It will be understood that such operations can be performed on the coefficients and/or pixels associated with the image or any intermediate compression steps of the image. For instance, JPEG photos undergo several intermediate steps during compression, and splitting and encrypting aspects described herein can be performed on such a JPEG photo in connection with any intermediate or final steps associated with the JPEG compression, thereby reducing computation errors. The encrypt section 210 can therefore produce a first encrypted sub-image and a second encrypted sub-image, which together can be represented as G(data+keystream) as shown at 335.
The middleware 205 can transmit the G(data+keystream), including the first and second encrypted sub-images, to cloud services 140. The cloud services 140 can perform various post-processing functions, represented here as f(.), such as resize, crop, and filter.
FIG. 4 illustrates a flow diagram of additional aspects associated with the decrypt section 230 and combiner 222 of FIG. 2. The decrypt section 230 of the middleware 205 can receive the f(G(data+keystream)) at 405 from the cloud services 140. The decrypt section 230 can then decrypt the f(G(data+keystream)) to recover the original image. For each RGB pixel value of the first encrypted sub-image 310, the decrypt section 230 subtracts a corresponding reconstructed keystream value (e.g. f(G(keystream))). Similarly, for each RGB pixel value of the second encrypted sub-image 315, the decrypt section 230 subtracts a corresponding reconstructed keystream value (e.g., f(G(keystream))) selected from the plurality of modified keystream values. For example, the following equation (3) as shown at 410 can be used:
recover_image=f(G(data+keystream))−f(G(keystream))  (3)
The G(keystream) can be modified by a predefined post-processing function f(.), which can be stored in database 225 and associated with a cloud service identifier (ID) 440. The database 225 can store multiple different post-processing functions associated with any number of different cloud services, each with its own ID. For example, if a photo-storage site is known to resize an image by a certain proportion, such function is stored in database 225 and identified by the associated site ID. Moreover, such post-processing functions can be determined based on experimental usage and analysis of the post-processing functions performed on images when subjected to the cloud service sites. The ID 440 can also be stored in the meta data of the image, as further described below.
The decrypt section 230 uses the master_key stored in the database 225 to generate the proper keystream, which together with the applied post-processing function f(.), results in f(G(keystream)). The f(G(keystream)) is used to decrypt the image data, as further shown at 410, 415, and 420. Further details regarding the master_key are provided below.
Almost all image processing algorithms have additive and homogeneity properties. Additivity is where f(x+y) is equivalent to f(x)+f(y). Homogeneity is where f(a*x) is equivalent to a*f(x), where a is the value of scalar. Because of these properties, as shown at 415, equation (3) can be re-written as equation (4) as follows:
recover_image=f(G(data))+f(G(keystream))−f(G(keystream))  (4)
Equation (4) can be reduced, as shown at 420, to equation (5), as follows:
recover_image=f(G(data))  (5)
The recovered image (i.e., recover_mage) corresponds to decrypted sub-images 310 and 315. The decrypted sub-images can be combined by the combiner 222 into substantially the original image 305.
FIGS. 5 and 6 illustrate block diagrams including a database 225 associated with the middleware 205 of FIG. 2. The encrypt section 210 can produce a master_key 505, which is stored in the database 225. More specifically, the RNG 215 can produce the master_key 505, which is preferably a 256-bit cryptographically strong random number. In addition, for each image, the RNG 215 can produce a random number (i.e., Rnumber 510), which is used to generate an image_key. The Rnumber 510 can be embedded in the metadata 525 of the image 520, and is preferably a 128-bit random number. The metadata 525 can also store the ID 440, which is described above.
The keystream can be generated, by either or both of the encrypt section 210 and the decrypt section 230, using at least the master_key 505, as shown in both FIGS. 5 and 6. For example, as shown at 535 and 635, the following function (6) can be used to generate the keystream:
keystream=Encrypt(image_key,pixel_index)  (6)
As set forth in (6), the Encrypt(.) function can be Advanced Encryption Standard (AES) cipher or any other suitable encryption algorithm. The pixel_index corresponds to the (u,v) pixel index location of the image. The image_key is used to guarantee that each instance of an image will have distinct keystream based upon the image_key that is derived in (7), as further set forth below. In other words, the keystream values discussed above are generated using the image_key and the pixel_index.
The image_key can be generated, by either or both of the encrypt section 210 and the decrypt section 230, using at least the Rnumber 510, as shown at 530 of FIG. 5 and at 630 of FIG. 6, according to the following function (7):
image_key=kdf(master_key,Rnumber∥Aux)  (7)
As set forth in (7), the kdf(.) function can be a standard key derivation function, either cipher or hash-based. The Aux can correspond to auxiliary data, such as for security purposes.
The encrypt section 210 of the middleware 205 can encrypt the image using (6) and/or (7). Likewise, the decrypt section 230 of the middleware 205 can decrypt the image using (6) and/or (7). As the middleware 205 is the only entity capable of producing the keystream, only the middleware 205 having the master_key 505 can decrypt the images.
FIG. 7 illustrates a flow diagram 700 of a technique for encrypting and uploading images to a cloud service(s). The technique begins at 705, where the middleware receives an image from a user or user application. At 710, the image is decompressed to recover RGB pixel values. At 715, the image is split into two sub-images. The number of bits associated with each RGB pixel value of sub-image 725 and sub-image 720 is less than the number of bits associated with each RGB pixel value of the original image. At 730, the middleware generates a keystream, which is added to the sub-images at 740 and 735, as explained in detail above. Image compression can be performed after or during the adding of the keystream. The encrypted sub-images at 750 and 745 are uploaded by the middleware to the cloud service(s) at 755.
FIG. 8 illustrates a flow diagram 800 of a technique for receiving and decrypting images from a cloud service. At 805, the cloud service(s) perform post-processing operations on the encrypted sub-images. At 810, the middleware receives the encrypted sub-images from the cloud service(s). At 820 and 815, the encrypted sub-images are made ready for decryption by the decrypt section of the middleware. At 830 and 825, the sub-images are decompressed using image decompression algorithms such as JPEG. At 835, the middleware generates the modified keystream, as explained in detail above, and the modified keystream is subtracted from the sub-images at 845 and 840, either during or after the decompression. The flow proceeds to decrypted sub-images at 855 and 850, which are recombined or otherwise reconstructed into the original image at 860.
FIG. 9 illustrates a flow and block diagram 900 related to permutating and encrypting blocks (e.g., (1), (2), . . . , (16)) of an image 905, according to another example embodiment of the present invention. FIG. 10 illustrates a flow and block diagram related to decrypting the image 905 of FIG. 9. Reference is now made to FIGS. 9 and 10.
Blocks of the image 905 can be defined to have a particular size, or otherwise divided into N blocks, each block including some number of pixels. For example, an image with 2048 by 1024 pixels can have the block size defined as 64 by 64 pixels. In such case, the total number of blocks will be 512. The encrypt section 210 can select a permutation from a factorial of N permutations. In other words, the encrypt section 210 can permutate the blocks in 512! (factorial of 512) number of different ways, which is even larger than 2512. Put differently, the encrypt section 210 can then permutate the N blocks of the image based on the selected permutation.
Based on the secret key 925, which can be stored in or otherwise associated with the file header 915 of the image 905, the middleware 205 can choose only one out of all possible 512! (factorial of 512) possibilities, which is practically infeasible for any third party, without the secret key 925, to guess correctly. This is quite different from, for example, a jigsaw puzzle where there is only one final pattern and pieces include various shapes to help with the orientation. The permutation causes the file content 910 of image 905 to be scrambled into the file content 920 of the permutated image 930. There is no clue that is available to human users on how to reconstruct the orientations. The middleware 205 can then upload the permutated image 930 to the cloud service(s) 140, which can perform post-processing functions (e.g., f(.)) on the permutated image.
As shown in FIG. 10, the permutated image is then received, from the cloud service(s) 140 and decrypted using the decrypt section 230. For example, the decrypt section 230 can use the secret key 925 to decrypt the permutation and return the file contents 920 of the permutated image 930 back to substantially the file contents 910 of the original image 905.
More specifically, the secure permutation can be performed by generating a keystream and by using the secret key 925 and a stream cipher F(.). The encrypt section 210 can receive an image having a size (e.g., height×width). A predefined block size M can be used. The encrypt section 210 can also receive and/or generate the secret key 825, the stream cipher F(.), and a key derivation function (e.g., kdf(.)). The encrypt section 210 can output instance_randomH and a permutated image.
The following are example elements of this approach:
1. Generate an index for the blocks; e.g., a[0]=0, a[1]=1, . . . a[N]=N.
2. For every instantiation of middleware to encrypt a photo by permutation, generate a random number H (e.g., 128-bit), referred to herein as instance_randomH.
3. instance_key=kdf(K, H), where K is the secret key 925. Each instance_key can be a distinct key to augment the security.
4. keystream F(instance_key, counter), where counter can increase from 0.
5. keystream is a bit stream (e.g., 1000111111110). Number u can be selected, where 2n is the least integer that is greater than N. Every 2n bits of keystream can be a partition or unit. For example: u=3→keystream[0]=100, keystream[1]=011, and so forth.
6. for j from N down to 2
    • a. dj=keystream[j] modulo N. (e.g., swap position is determined by stream cipher)
    • b. swap a[dj] and a[j−1]
7. endfor
8. Permute the blocks of the image according to a[j], for j from 0 to N
According to above algorithm, the encrypt section 210 can permute the blocks of the image. The decrypt section 230 can gain access to the secret key K (e.g., 925) and the private hint H (i.e., instance_randomH) to generate the permutation sequence. The permutation can then be reversed and the original image reconstructed. The stream cipher F(.) and the derivation function kdf(.) can be public, and H is a random number used as the instance identifier.
Put differently, methods disclosed herein include selecting a permutation from a factorial of N permutations. A keystream can be generated. The N blocks can be permutated based on the keystream and the selected permutation. Each of the N blocks can be swapped with another of the N blocks based on the keystream. N swap positions can be determined. For example, the swap position can be based on keystream[j] modulo N, where j is an index into the keystream. The index j can be decremented from N down to 2. Each of the N blocks can be swapped with another of the N blocks located at the swap position.
FIG. 11 illustrates a block diagram 1100 of a physical object 1105 having affixed thereto an encrypted printed image 1110, according to yet another example embodiment of the present invention.
The middleware 205 can encrypt an image using one or more of the techniques described. In detail above. The image can then be physically transformed, as shown at 1120. The physical transformations can include resizing, scaling, compressing, cropping, and so forth, and can be performed on the encrypted image electronically and/or on physical printed media. The image can be printed on physical media, thereby resulting in a printed image 1110. The printed image 1110 is scrambled or otherwise undecipherable without the appropriate decryption algorithm and keys. Hackers or other adversaries are therefore prevented from interpreting the printed image 1110. Unlike a barcode, which can be easily intercepted and interpreted by hackers or other third parties, the encrypted image allows information to be securely transmitted in the physical non-electronic world. The printed image can be affixed to a physical object 1105. The physical object can be, for example, a package, a sign, paper, a display, a magazine, a newspaper, and the like. The physical object can also be a screen or a display, such as a move screen, a TV screen, a computer display, a phone display, or the like.
The printed image 1110 can be photographed or scanned using, for example, a camera and/or scanner 1115. In other words, a digital image can be captured of the printed image 1110. The middleware 205 can decrypt the digital image, using one or more of the techniques described in detail above. The decryption algorithm can reconstruct the original image, or at least an approximate of the original image, because the middleware 205 has access to the master key and the other components and algorithms for decrypting the photographed or scanned image, notwithstanding the physical transformations 1120 of the encrypted image.
In this manner, images can be covertly transmitted, using a form of visual cryptography, which can be used for advertising, subscription services, audience selection, games, secure social networking, among other possibilities. For example, images can be privately or covertly transmitted from middleware, to a physical object, then to an endpoint such as the same or different middleware. Thus, the image can remain confidential or private, even when exposed to external physical world scenarios.
Although particular embodiments have been described, it will be appreciated that the principles of the invention are not limited to those embodiments. Embodiments include middleware for uploading encrypted image data to websites (e.g., social media and/or cloud services) using the lossy data formats already accepted by the backend services using a new loss-resilient encryption algorithm. The resilient encrypted image cipher text can be manipulated by the back end cloud services (e.g., compressed, cropped, transformed, filtered, etc.), yet the approximate original image can still be restored given the ciphertext and a secret decryption key used by authorized parties.
The encrypted image can be downloaded, copied, moved, manipulated and uploaded to other websites while remaining secure (i.e., encrypted) so only parties with the correct key can decrypt the image and restore the approximate original using one or more of the resilient encryption algorithms disclosed herein. Specialized hardware or hardware accelerators can be used to accelerate the resilient cryptographic algorithms. The middleware can be included within general purpose computers, tablets, smart phones, ultrabooks, servers, or the like. Embodiments disclosed herein enhance image and media privacy, allowing manipulation of ciphertext, while providing the ability to recover the original plaintext content.
In some embodiments, an article drawn from the set of media including floppy disks, optical disks, fixed disks, volatile memory, non-volatile memory, random access memory, read-only memory, or flash memory, comprising a machine-accessible medium having associated non-transitory instructions that, when executed in a test and measurement device, results in a machine performing the steps of the various embodiments of the invention as disclosed herein. Other variations and modifications may be made without departing from the principles of the invention as set forth in the following claims.

Claims (18)

What is claimed is:
1. A method operating on a processor for preserving image privacy by encrypting an original image for later storage on a publically accessible storage facility, comprising:
receiving the original image;
splitting the original image into first and second sub-images, each of the first and second sub-images having a same number of pixels as the original image;
for each of a plurality of pixel values of the first sub-image, adding a first corresponding keystream value selected from a plurality of keystream values;
producing a first encrypted sub-image;
for each of a plurality of pixel values of the second sub-image, adding a second corresponding keystream value selected from the plurality of keystream values, the second corresponding keystream value different than the first corresponding keystream value;
producing a second encrypted sub-image; and
storing the first encrypted sub-image and the second encrypted sub-image as data for transmission to the publically accessible storage facility.
2. The method of claim 1, wherein the pixel values are Red/Green/Blue (RGB) pixel values, and wherein splitting further comprises:
determining an RGB pixel value for each of a plurality of pixels of the original image;
dividing each RGB pixel value of the original image into a first split RGB pixel value and a second split RGB pixel value;
associating each of the first split RGB pixel values with a corresponding RGB pixel value of the first sub-image; and
associating each of the second split RGB pixel values with a corresponding RGB pixel value of the second sub-image.
3. The method of claim 1, in which transmission to the publically accessible storage facility comprises
transmitting the first and second encrypted sub-images to a cloud service.
4. The method of claim 1, wherein the pixel values are RGB pixel values, the method further comprising:
receiving the first and second encrypted sub-images from the cloud service;
for each RGB pixel value of the first sub-image, subtracting a corresponding modified keystream value selected from a plurality of modified keystream values;
producing a first decrypted sub-image;
for each RGB pixel value of the second sub-image, subtracting a corresponding modified keystream value selected from the plurality of modified keystream values; and
producing a second decrypted sub-image.
5. The method of claim 4, further comprising:
combining the first and second decrypted sub-images into the original image or a reconstructed version of the original image.
6. The method of claim 4, further comprising:
producing a master key;
storing the master key in a database;
generating the plurality of keystream values using at least the master key;
modifying the plurality of keystream values according to a predefined post-processing function, thereby producing the plurality of modified keystream values.
7. The method of claim 6, further comprising:
producing a random number using a random number generator;
storing the random number in metadata of at least one of the first and second sub-images; and
generating an image key using at least the random number.
8. The method of claim 6, further comprising:
associating the predefined post-processing function to an identifier of a cloud service;
storing the identifier in metadata of at least one of the first and second sub-images; and
identifying the predefined post-processing function using the identifier.
9. The method of claim 1, wherein the original image is formed of a number of pixels with an n-bit depth, and wherein at least the first sub-image has a bit depth less than the n-bit depth.
10. The method of claim 9, wherein the first sub-image has a bit depth of n−1.
11. The method of claim 9, wherein the first keystream value is a number having a length of n−1 bits.
12. A middleware processor for encrypting an original image for later storage on a publically accessible storage facility, comprising:
a computer hardware assisted splitter configured to split an original image into first and second sub-images, the first and second sub-images having a same number of pixels as the original image;
a computer hardware assisted encrypter configured to:
add each of a plurality of pixel values of the first sub-image to a first corresponding keystream value selected from a plurality of keystream values;
produce a first encrypted sub-image;
add each of a plurality of pixel values of the second sub-image to a second corresponding keystream value selected from the plurality of keystream values, the second corresponding keystream value different than the first corresponding keystream value; and
produce a second encrypted sub-image: and
a physical memory for receiving and storing the first encrypted sub-image and the second encrypted sub-image as data.
13. The middleware processor of claim 12, wherein the pixel values are Red/Green/Blue (RGB) pixel values, and wherein the splitter is further configured to:
determine an RGB pixel value for each of a plurality of pixels of the original image;
divide each RGB pixel value of the original image into a first split RGB pixel value and a second split RGB pixel value;
associate each of the first split RGB pixel values with a corresponding RGB pixel value of the first sub-image; and
associate each of the second split RGB pixel values with a corresponding RGB pixel value of the second sub-image.
14. The middleware processor of claim 12, wherein the middleware is configured to transmit the first and second encrypted sub-images to a cloud service.
15. The middleware processor of claim 12, wherein the pixel values are RGB pixel values, the apparatus further comprising:
a decrypt section configured to:
subtract a modified keystream value, selected from a plurality of modified keystream values, from each RGB pixel value of the first sub-image;
produce a first decrypted sub-image;
subtract a modified keystream value, selected from the plurality of modified keystream values, from each RGB pixel value of the second sub-image; and
produce a second decrypted sub-image; and
a combiner configured to combing the first and second decrypted sub-images into substantially the original image.
16. The middleware processor of claim 12, further comprising:
a random number generator configured to produce a master key; and
a database configured to store the master key,
wherein the encrypt section is configured to generate the plurality of keystream values based on at least the master key.
17. The middleware processor of claim 12, further comprising:
a random number generator configured to produce a random number storable in metadata of at least one of the first and second sub-images; and
an image key based on at least the random number.
18. One or more tangible computer-readable media storing non-transitory computer-executable instructions that, when executed by a processor, operate to perform a method for preserving image privacy by encrypting an original image for later storage on a publically accessible storage facility, the method comprising:
receiving the original image;
splitting the original image into first and second sub-images, each of the first and second sub-images having a same number of pixels as the original image;
for each of a plurality of pixel values of the first sub-image, adding a first corresponding keystream value selected from a plurality of keystream values;
producing a first encrypted sub-image;
for each of a plurality of pixel values of the second sub-image, adding a second corresponding keystream value selected from the plurality of keystream values, the second corresponding keystream value different than the first corresponding keystream value;
producing a second encrypted sub-image; and
storing the first encrypted sub-image and the second encrypted sub-image as data for transmission to the publically accessible storage facility.
US13/976,298 2011-12-15 2011-12-15 Preserving image privacy when manipulated by cloud services Expired - Fee Related US9276745B2 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2011/065284 WO2013089758A1 (en) 2011-12-15 2011-12-15 Preserving image privacy when manipulated by cloud services

Publications (2)

Publication Number Publication Date
US20130279690A1 US20130279690A1 (en) 2013-10-24
US9276745B2 true US9276745B2 (en) 2016-03-01

Family

ID=48613036

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/976,298 Expired - Fee Related US9276745B2 (en) 2011-12-15 2011-12-15 Preserving image privacy when manipulated by cloud services

Country Status (4)

Country Link
US (1) US9276745B2 (en)
EP (1) EP2791855B1 (en)
CN (1) CN104040934B (en)
WO (1) WO2013089758A1 (en)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013147908A1 (en) 2012-03-31 2013-10-03 Intel Corporation Methods and systems for cryptographic access control of video
US9160722B2 (en) * 2012-04-30 2015-10-13 Anchorfree, Inc. System and method for securing user information on social networks
US9396310B2 (en) * 2013-07-15 2016-07-19 At&T Intellectual Property I, L.P. Method and apparatus for providing secure image encryption and decryption
US10382194B1 (en) 2014-01-10 2019-08-13 Rockwell Collins, Inc. Homomorphic encryption based high integrity computing system
US9203612B1 (en) 2014-06-02 2015-12-01 Atlanta DTH, Inc. Systems and methods for controlling media distribution
EP2981063B1 (en) 2014-07-31 2020-03-04 Samsung Electronics Co., Ltd Method of modifying image including photographing restricted element, and device for performing the method
CN107005272A (en) * 2014-10-21 2017-08-01 杰德烈·皮埃特里卡 The system and method that signal of communication for down-hole application is handled
EP3272060B1 (en) * 2015-03-20 2019-05-01 Hewlett-Packard Enterprise Development LP Datastream block encryption
CN104992113A (en) * 2015-05-29 2015-10-21 北京奇虎科技有限公司 Method and device for detecting whether privacy content of website is exposed, and cloud monitoring system
DE102015210576B4 (en) * 2015-06-09 2020-10-08 Eberhard Karls Universität Tübingen Encryption pixel matrix; Process for their production; Image file, video file and video data stream with such a pixel matrix, method for generating a clear image matrix based on such an encryption pixel matrix and decoding unit for performing this method
GB201516880D0 (en) 2015-09-23 2015-11-04 Pixelrights Ltd Secure distribution of an image
CN105681309B (en) * 2016-01-26 2018-06-19 腾讯科技(深圳)有限公司 A kind of information processing method, first terminal, second terminal and server
US9847974B2 (en) 2016-04-28 2017-12-19 Xerox Corporation Image document processing in a client-server system including privacy-preserving text recognition
US11516154B2 (en) 2017-07-13 2022-11-29 Apple Inc. Systems for managing messaging conversations
US10437580B2 (en) 2017-09-11 2019-10-08 Apple Inc. Software updating methods and systems
US11330331B2 (en) 2017-12-12 2022-05-10 Google Llc Proactive detection of media item matching
JP7028005B2 (en) * 2018-03-22 2022-03-02 富士フイルムビジネスイノベーション株式会社 Information processing device, information processing program, browsing device, browsing program, and information processing system
CN108924552B (en) * 2018-08-07 2019-11-22 华中科技大学 Decompression method and system under jpeg image ciphertext based on homomorphic cryptography
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
CN112330521B (en) * 2020-10-21 2024-07-05 南京航空航天大学 Image encryption method
CN112751981B (en) * 2021-02-20 2022-09-23 新疆医科大学第一附属医院 Batch transmission encryption method for sliced digital images
CN113094731B (en) * 2021-04-15 2023-04-07 西南大学 Block chain privacy protection method based on different distribution recombination scheme
CN113038089B (en) * 2021-05-21 2021-09-14 浙江宇视科技有限公司 Intelligent identification dynamic self-decoding processing method and device, electronic equipment and storage medium
CN113595715A (en) * 2021-07-23 2021-11-02 华东交通大学 Logistic-based double-pixel rectangular mapping color image encryption and decryption method
CN114553499B (en) * 2022-01-28 2024-02-13 中国银联股份有限公司 Image encryption and image processing method, device, equipment and medium

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1187483A2 (en) 2000-09-07 2002-03-13 Eastman Kodak Company An encryption apparatus and method for synchronizing multiple encryption keys with a data stream
US6560339B1 (en) * 1998-02-17 2003-05-06 Canon Kabushiki Kaisha Electronic watermarking method, digital information distribution system using such method, and storage medium storing program of such method
US20030235325A1 (en) 2002-06-24 2003-12-25 Eastman Kodak Company Method for securely transacting a transaction based on a transaction document
US20040081334A1 (en) 2002-10-18 2004-04-29 Canon Kabushiki Kaisha Information processing method and apparatus, computer program, and computer-readable storage medium
US20040141613A1 (en) 2003-01-14 2004-07-22 Canon Kabushiki Kaisha Information processing method and apparatus, and computer program and computer-readable storage medium
US20060026428A1 (en) * 2002-11-29 2006-02-02 Koninklijke Philips Electronics N.V. Key synchronization in an image cryptographic systems
US20060045309A1 (en) 2004-06-14 2006-03-02 Shan Suthaharan Systems and methods for digital content security
EP1906332A2 (en) 2006-09-26 2008-04-02 Fujitsu Limited Secure device having key management function and information processing apparatus
US20090220076A1 (en) * 2008-02-28 2009-09-03 Fujitsu Limited Image decrypting apparatus, image encrypting apparatus, and image decrypting method
US20100034380A1 (en) * 2008-08-06 2010-02-11 Samsung Electronics Co., Ltd Scanning apparatus, host apparatus and scan image processing method thereof
US20100046750A1 (en) * 2006-11-24 2010-02-25 Bayer Innovation Gmbh Coding method, decoding method, codec and data storage medium for holographic storage
US20100074443A1 (en) * 2007-05-30 2010-03-25 Fujitsu Limited Image encryption and image decryption apparatus and method
US20110197056A1 (en) 2010-01-08 2011-08-11 The Research Foundation Of State University Of New York Secure distributed storage system and method
US20110222687A1 (en) 2008-08-13 2011-09-15 Gvbb Holdings S.A.R.L. Apparatus and method for encrypting image data, and decrypting the encrypted image data, and image data distribution system
US20130251143A1 (en) * 2010-09-30 2013-09-26 Fujitsu Limited Image encryption system and image decryption system
US20130305383A1 (en) * 2010-12-22 2013-11-14 Intel Corporation System and method to protect user privacy in multimedia uploaded to internet sites

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6560339B1 (en) * 1998-02-17 2003-05-06 Canon Kabushiki Kaisha Electronic watermarking method, digital information distribution system using such method, and storage medium storing program of such method
EP1187483A2 (en) 2000-09-07 2002-03-13 Eastman Kodak Company An encryption apparatus and method for synchronizing multiple encryption keys with a data stream
US20030235325A1 (en) 2002-06-24 2003-12-25 Eastman Kodak Company Method for securely transacting a transaction based on a transaction document
US20040081334A1 (en) 2002-10-18 2004-04-29 Canon Kabushiki Kaisha Information processing method and apparatus, computer program, and computer-readable storage medium
US20060026428A1 (en) * 2002-11-29 2006-02-02 Koninklijke Philips Electronics N.V. Key synchronization in an image cryptographic systems
US20040141613A1 (en) 2003-01-14 2004-07-22 Canon Kabushiki Kaisha Information processing method and apparatus, and computer program and computer-readable storage medium
US20060045309A1 (en) 2004-06-14 2006-03-02 Shan Suthaharan Systems and methods for digital content security
EP1906332A2 (en) 2006-09-26 2008-04-02 Fujitsu Limited Secure device having key management function and information processing apparatus
US20100046750A1 (en) * 2006-11-24 2010-02-25 Bayer Innovation Gmbh Coding method, decoding method, codec and data storage medium for holographic storage
US20100074443A1 (en) * 2007-05-30 2010-03-25 Fujitsu Limited Image encryption and image decryption apparatus and method
US20090220076A1 (en) * 2008-02-28 2009-09-03 Fujitsu Limited Image decrypting apparatus, image encrypting apparatus, and image decrypting method
US20100034380A1 (en) * 2008-08-06 2010-02-11 Samsung Electronics Co., Ltd Scanning apparatus, host apparatus and scan image processing method thereof
US20110222687A1 (en) 2008-08-13 2011-09-15 Gvbb Holdings S.A.R.L. Apparatus and method for encrypting image data, and decrypting the encrypted image data, and image data distribution system
US20110197056A1 (en) 2010-01-08 2011-08-11 The Research Foundation Of State University Of New York Secure distributed storage system and method
US20130251143A1 (en) * 2010-09-30 2013-09-26 Fujitsu Limited Image encryption system and image decryption system
US20130305383A1 (en) * 2010-12-22 2013-11-14 Intel Corporation System and method to protect user privacy in multimedia uploaded to internet sites

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
European Patent Office, Extended European Search Report, Application No. 11877297.9, Jul. 15, 2015, 6 pages, Munich, Germany.
International Search Report and Written Opinion, Aug. 27, 2012, 9 pages, International Application No. PCT/US2011/065284, Korean International Patent Office, Metropolitan City, Korea.

Also Published As

Publication number Publication date
US20130279690A1 (en) 2013-10-24
CN104040934A (en) 2014-09-10
EP2791855A1 (en) 2014-10-22
WO2013089758A1 (en) 2013-06-20
CN104040934B (en) 2018-04-24
EP2791855B1 (en) 2019-01-23
EP2791855A4 (en) 2015-08-12

Similar Documents

Publication Publication Date Title
US9276745B2 (en) Preserving image privacy when manipulated by cloud services
Qian et al. Separable reversible data hiding in encrypted JPEG bitstreams
Li et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Wright et al. Thumbnail-preserving encryption for JPEG
Parameshachari et al. Partial image encryption algorithm using pixel position manipulation technique: The smart copyback system
Liang et al. Huffman-code based retrieval for encrypted JPEG images
Amalarethinam et al. Image encryption and decryption in public key cryptography based on MR
Soleymani et al. A survey on principal aspects of secure image transmission
SaiChandana et al. A new visual cryptography scheme for color images
Sharma et al. Multi-image steganography and authentication using crypto-stego techniques
CN112035847A (en) Image encryption and decryption method and device, electronic equipment and storage medium
Sazaki et al. Implementation of affine transform method and advanced hill cipher for securing digital images
Li et al. Ftpe-Bc: Fast Thumbnail-Preserving Image Encryption Using Block-Churning
CN113206926B (en) Method for balancing privacy and usability of image based on three-pixel-point encryption
CN114374773A (en) Method for encrypting image acquisition synchronization information and decrypting, restoring and recovering image acquisition synchronization information at using end
Lotlikar et al. Image steganography and cryptography using three level password security
Ahmed et al. Improve Security Using Steganography and Cryptography Based on Smartphone Users Locations
Poongothai et al. Retinal Encryption Using Snnipet Pixel XOR with Huffman Sequential Encoding for Privacy Augmentation
Liu et al. Hiding media data via shaders: Enabling private sharing in the clouds
Shimizu et al. Cube-based encryption connected prior to Motion JPEG standard
Kanchana et al. An enhanced VCS of image encryption using SDS algorithm without secret keys
Wu et al. Secret digital images over cloud computing using meaningful secret sharing technique
Hossain et al. Secured transmission of sensitive images of skin diseases using steganography and cryptography
Naqash et al. Review on safe reversible image data hiding
Abbas et al. A Novel Approach Towards Fusion of Steganography and Cryptography for Enhanced Data Security using RGB Image

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTEL CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DURHAM, DAVID M.;LONG, MEN;GREWAL, KARANVIR S.;AND OTHERS;SIGNING DATES FROM 20111216 TO 20111219;REEL/FRAME:027555/0439

ZAAA Notice of allowance and fees due

Free format text: ORIGINAL CODE: NOA

ZAAB Notice of allowance mailed

Free format text: ORIGINAL CODE: MN/=.

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20240301